Foreign Terrorist Fighters. Manual for Judicial Training Institutes. South

Total Page:16

File Type:pdf, Size:1020Kb

Foreign Terrorist Fighters. Manual for Judicial Training Institutes. South Foreign Terrorist Fighters Manual for Judicial Training Institutes South-Eastern Europe Updated Edition 2019 Cover images: istockphoto.com/xijian, istockphoto.com/bubaone UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Foreign Terrorist Fighters Manual for Judicial Training Institutes South-Eastern Europe Updated Edition 2019 UNITED NATIONS Vienna, 2019 © United Nations, December 2019. All rights reserved, worldwide. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Reference to names of firms and commercial products and processes does not imply their endorsement by UNODC, and any failure to mention a particular firm, com- mercial product or process is not a sign of disapproval. UNODC takes no responsibility for the content of any external website. This handbook is a technical tool that has been developed for training purposes to support crime prevention and criminal justice practitioners in South-Eastern Europe. This publication has not been formally edited. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Contents Abbreviations . v Introduction . 1 I . The foreign terrorist fighter phenomenon . 3 1.1 Scope of the term “foreign terrorist fighter” .................... 3 1.2 Typology and motivation . 4 1.3 Women and children ...................................... 9 1.4 Evolution of the phenomenon . 13 1.5 Global situation . 15 1.6 Regional situation in South-Eastern Europe .................... 21 II . Foreign terrorist fighters – the international and regional legal frameworks . 31 2.1 The international legal framework ............................ 31 2.2 The regional framework .................................... 43 III . Online investigation of offences related to foreign terrorist fighters . 59 3.1 Online investigations. 62 3.2 How to collect e-evidence?. 79 3.3 Special investigative techniques and foreign terrorist fighters ........ 83 Annexes . 87 List of international legal instruments related to terrorism and foreign terrorist fighters ........................................ 87 List of regional legal instruments related to terrorism and foreign terrorist fighters . 88 iii Abbreviations AQI Al-Qaida in Iraq CDCT Council of Europe Committee on Counter-Terrorism CGN Carrier Grade Network Address Translation CHIS covert human intelligence source CII covert Internet investigator CODEXTER Committee of Experts on Terrorism CSV comma-separated value CTC United Nations Security Council Counter-Terrorism Committee CTED United Nations Security Council Counter-Terrorism Executive Directorate DHCP Dynamic Host Configuration Protocol DNA deoxyribonucleic acid ESI electronically stored information EUCTS European Union Counter-Terrorism Strategy EU-RAN European Union Radicalisation Awareness Network EXIF exchangeable image file format FTF foreign terrorist fighters FTP File Transfer Protocol GCTF Global Counterterrorism Forum GIMF Global Islamic Media Front GPS Global Positioning System HTML Hypertext Markup Language HTS Hayat Tahrir al-Sham HTTP Hypertext Transfer Protocol IACP International Association of Chiefs of Police IAEA International Atomic Energy Agency IANA International Assigned Number Authority IAP International Association of Prosecutors IIJ International Institute for Justice and the Rule of Law IP Internet Protocol ISP Internet service provider MILF Moro Islamic Liberation Front MLA Mutual Legal Assistance v OCTA Organized Crime Threat Assessment OS operating system OSINT open-source intelligence P2P peer-to-peer PNR passenger name record RAM random access memory SDF Syrian Democratic Forces SEE South-Eastern Europe SIM subscriber identity module SNA social network analysis TCP Transmission Control Protocol TOR The Onion Router UNODC United Nations Office on Drugs and Crime URL Uniform Resource Locator USB Universal Serial Bus VPN virtual private network vi Introduction This updated edition of the UNODC publication “Foreign Terrorist Fighters. Manual for Judicial Training Institutes. South-Eastern Europe”, which was issued in 2017, aims to reflect recent developments in the world, especially in South-Eastern Europe (SEE), related to foreign terrorist fighters (FTFs), and provide crime prevention and criminal justice practitioners in the region with the updated knowledge and skills to address new FTF-related challenges.1 Chapter 1 is expanded to elaborate on the FTF phenomenon and its evolution at the global and regional levels. It includes a section covering the developments in SEE and sections on the general FTF-related trends which largely draw upon earlier UNODC publications, such as “Investigation, Prosecution and Adjudication of Foreign Terrorist Cases for South and South-East Asia” (2018). Chapter 2 is updated to include details of the recent global and regional legal documents on countering and preventing ter- rorism with a focus on FTFs related aspects. For example, this chapter features Security Council resolution 2396 (2017), which addresses the risks posed by returning FTFs. The original publication covered only the earlier Security Council resolution 2178 (2014), which discussed FTFs’ travel abroad to join terrorist groups. The updated chapter 3 responds to the requests from the SEE crime prevention and criminal justice practitioners to equip them with the updated information and tools for online investiga- tions in terrorism cases. It provides examples of online search tools that are available to investigators for open source intelligence gathering (OSINT). The original version of the manual was part of a UNODC project, launched in 2016, which covered Albania, Bosnia and Herzegovina, Montenegro, North Macedonia and Serbia, as well as Kosovo.2 The project addressed the complex and interrelated chal- lenges posed by FTFs to the criminal justice systems in the region. The UNODC project built upon continuous cooperation with counterparts from the region towards an effective and a sustainable legal regime against FTFs, founded in the rule of law, due process, and human rights. In the course of the project, the UNODC team visited and interviewed judges, prosecutors and managers and trainers of judicial institutes in the region. The work culminated in the production of the FTF training manual to be utilized by judges and/or prosecutors and incorporated into existing training courses delivered by national training institutes. Published in 2017, the manual attracted the attention of policymakers and practitioners concerned with the challenge of FTFs 1 United Nations Office on Drugs and Crime, “Foreign Terrorist Fighters”, Manual for Judicial Training Institutes South-East Europe, September 2017. 2 All references to Kosovo in the present document should be understood to be in the context of the United Nations Security Council resolution 1244 (1999). 1 2 MANUAL FOR JUDICIAL TRAINING INSTITUTES SOUTH-EASTERN EUROPE phenomenon.3 It addressed the extent, structure and dynamics of the FTF phenomenon, the elements of FTF-related offences and investigations of FTF offences with special regard to online and financial investigations. The Government of the United States of America provided funding for the project, including the publication of the manual. “Foreign Terrorist Fighters. Manual for Judicial Training Institutes. South-Eastern Europe / Updated Edition 2019” aims to preserve its relevance as a tool to be utilized by judges and prosecutors and incorporated into existing training courses delivered by national training institutes in the region. This updated edition is funded by the European Union. 3 The webstory announcing the launch of the publication was the most visited webpage of UNODC in 2017. I. The foreign terrorist fighter phenomenon 1.1 Scope of the term “foreign terrorist fighter” The concept of “foreign fighters” is not a modern invention. Fighters from abroad have participated in nearly 100 civil wars over the past 250 years.4 The Spanish Civil War (1936–1939), which saw 50,000 volunteers from more than 50 countries, representing both sides of the conflict, is a prime example.5 The term “foreign fighter” was officially first used in reference to fighters travelling from outside the conflict zone to fight for Al-Qaida in Afghanistan. Later on, the term “foreign fighter” was employed in the context of the terrorist-led insurgency that started in Iraq in 2003. In the absence of a legal definition, commentators provided differing meanings of the term. One of the most widely accepted definitions was put forth by the Geneva Academy of International Humanitarian Law and Human Rights: “A foreign fighter is an individual who leaves his or her country of origin or habitual residence to join a non-State armed group in an armed conflict abroad and who is pri- marily motivated by ideology, religion, and/or kinship”.6 The phenomenon of terrorists travelling internationally to commit attacks, while not new, has gained traction since global travel became easier in the twentieth century. The first notable appearance of the term “foreign terrorist fighters”, or “FTFs”, traces back to Security Council resolution 2170 (2014). The resolution was adopted in August 2014 in response to the then-escalating crises in Iraq and the Syrian Arab Republic. Condemning the terrorist acts undertaken in
Recommended publications
  • Countering the Myths of Is How to Counter the Is Narrative Online? the Case of Albanian Speaking Countries
    REPORT BY KCSS MARCH 2019 / 02 Kosovar Centre for Security Studies COUNTERING THE MYTHS OF IS HOW TO COUNTER THE IS NARRATIVE ONLINE? THE CASE OF ALBANIANSPEAKING COUNTRIES MARCH 2019 Publisher: Kosovar Centre for Security Studies Authors: Vesë Kelmendi & Rudinë Jakupi Internal reviewer: Skender Perteshi External reviewer: Garentina Kraja © All rights reserved by Kosovar Centre for Security Studies. Intellectual property rights protected by Law No. 04/L-065 on Copyright and Related Rights and Law No. 05/L-047 on Amending and Supplementing the Law No. 04/L-065 on Copyright and Related Rights. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical or otherwise, without prior permission of the publisher. Opinions expressed in this publication do not necessarily represent those of Embassy of the Kingdom of the Netherlands. This project was supported by the Embassy of the Netherlands in Kosovo. The views expressed in this research are those of Kosovar Centre for Security This project was supported by the Embassy of the Netherlands in Kosovo. The views expressed in this research are those of Kosovar Centre for Security Studies and do not necessarily represent those of the Embassy of the Netherlands in Kosovo. REPORT BY KCSS 03/2018 Kosovar Centre for Security Studies COUNTERING THE MYTHS OF IS HOWTHE TOUNEXPLORED COUNTER THE NEXUS: IS NARRATIVE ONLINE? THEISSUES CASE OF ALBANIAN-SPEAKINGOF RADICALISATION COUNTRIES AND VIOLENT EXTREMISM IN MACEDONIA MARCH 2018 REPORT BY KCSS TABLE OF CONTENT 1. INTRODUCTION .................................................................................................................6 1.1. Methodology .................................................................................................................................................... 8 2.
    [Show full text]
  • Downloads/Reports/2016/Pdf/BTI 2016 Kosova.Pdf
    Tourism governance in post-war transition: The case of Kosova REKA, Shqiperim Available from the Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/24197/ A Sheffield Hallam University thesis This thesis is protected by copyright which belongs to the author. The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author. When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. Please visit http://shura.shu.ac.uk/24197/ and http://shura.shu.ac.uk/information.html for further details about copyright and re-use permissions. "Tourism governance in post-war transition: the case of Kosova" Shqiperim Reka A thesis submitted in partial fulfilment of the requirements of Sheffield Hallam University for the degree of Doctor of Philosophy February 2017 Abstract The aim of this research study was to examine tourism governance in post-war transition with specific reference to the influence of political, economic and social factors, institutional arrangements, collaboration and power relations. Within this context, a crucial objective was to assess the role of mindset. Reviewing the literature in relation to the key concepts, it was discovered that research tends to focus on political and economic transition, whereas the social dimension, despite its importance, is largely neglected. Similarly, tourism governance has been overlooked in studies of tourism in post-war transition. Furthermore, the literature on tourism governance rarely takes the issue of mindset into account. To address these gaps in knowledge, a qualitative research approach was applied to study tourism governance in post-war transitional Kosova.
    [Show full text]
  • Rebooting U.S. Security Cooperation in Iraq
    Rebooting U.S. Security Cooperation in Iraq MICHAEL KNIGHTS POLICY FOCUS 137 Rebooting U.S. Security Cooperation in Iraq MICHAEL KNIGHTS THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY www.washingtoninstitute.org The opinions expressed in this Policy Focus are those of the author and not necessarily those of The Washington Institute, its Board of Trustees, or its Board of Advisors. All rights reserved. Printed in the United States of America. No part of this publica- tion may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. © 2015 by The Washington Institute for Near East Policy The Washington Institute for Near East Policy 1828 L Street NW, Suite 1050 Washington, DC 20036 Design: 1000colors Photo: A Kurdish fighter keeps guard while overlooking positions of Islamic State mili- tants near Mosul, northern Iraq, August 2014. (REUTERS/Youssef Boudlal) CONTENTS Acknowledgments | v Acronyms | vi Executive Summary | viii 1 Introduction | 1 2 Federal Government Security Forces in Iraq | 6 3 Security Forces in Iraqi Kurdistan | 26 4 Optimizing U.S. Security Cooperation in Iraq | 39 5 Issues and Options for U.S. Policymakers | 48 About the Author | 74 TABLES 1 Effective Combat Manpower of Iraq Security Forces | 8 2 Assessment of ISF and Kurdish Forces as Security Cooperation Partners | 43 FIGURES 1 ISF Brigade Order of Battle, January 2015 | 10 2 Kurdish Brigade Order of Battle, January 2015 | 28 ACKNOWLEDGMENTS My thanks to a range of colleagues for their encouragement and assistance in the writing of this study.
    [Show full text]
  • Connecticut's Convention & Hospitality Industry Welcomes the Inaugural “Connect New England” Tr
    MEDIA CONTACTS: Annika Deming, Communications - Connecticut Convention Center, 860-728-2605, Cell 860-990-1216 Laura Soll, Communications - Connecticut Convention & Sports Bureau, 860-688-4499, Cell 860-833-4466 CONNECTICUT’S CONVENTION & HOSPITALITY INDUSTRY WELCOMES THE INAUGURAL “CONNECT NEW ENGLAND” TRADE SHOW TO HARTFORD HARTFORD, CONN., June 21, 2016 – This week, Downtown HartFord will be the site oF the first-ever “Connect New England.” The prestigious appointment-only trade show will bring together the most active planners, suppliers and experts in association, sports and specialty meetings who Focus on New England destinations For their meetings and events. The private event will take place on Wednesday, June 22 through Friday, June 24, 2016, at the Connecticut Convention Center, 100 Columbus Blvd. in HartFord, Connecticut. Attendees will stay at the connecting Marriott HartFord Downtown. “Connect New England” is hosted by Connect in partnership with Connecticut Convention Center, the Connecticut Convention & Sports Bureau, and the Hartford Marriott Downtown/Waterford Hotel Group. “We are very pleased that Connect selected Connecticut’s Capital City as the site of this first-time event," says H. Scott Phelps, president oF Connecticut Convention & Sports Bureau (CTCSB), the State’s oFFicial meetings and sports event sales and marketing organization. “We welcome the opportunity to meet many inFluential professional meeting planners From across New England and to help them discover what makes our state an attractive choice For so many conventions, meetings and sports events.” “Hosting Connect New England allows us to provide the planners with the unique opportunity to experience the Convention Center and the city of Hartford as their meeting attendees would,” says Michele Hughes, Director of Sales & Marketing For the Connecticut Convention Center.
    [Show full text]
  • In Their Own Words: Voices of Jihad
    THE ARTS This PDF document was made available from www.rand.org as CHILD POLICY a public service of the RAND Corporation. CIVIL JUSTICE EDUCATION Jump down to document ENERGY AND ENVIRONMENT 6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit research NATIONAL SECURITY POPULATION AND AGING organization providing objective analysis and PUBLIC SAFETY effective solutions that address the challenges facing SCIENCE AND TECHNOLOGY the public and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY Support RAND TRANSPORTATION AND INFRASTRUCTURE Purchase this document WORKFORCE AND WORKPLACE Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Learn more about the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND monographs undergo rigorous peer review to ensure high standards for research quality and objectivity. in their own words Voices of Jihad compilation and commentary David Aaron Approved for public release; distribution unlimited C O R P O R A T I O N This book results from the RAND Corporation's continuing program of self-initiated research.
    [Show full text]
  • The First Illyrian War: a Study in Roman Imperialism
    The First Illyrian War: A Study in Roman Imperialism Catherine A. McPherson Department of History and Classical Studies McGill University, Montreal February, 2012 A thesis submitted to McGill University in partial fulfillment of the requirements of the degree of Master of Arts ©Catherine A. McPherson, 2012. Table of Contents Abstract ……………………………………………….……………............2 Abrégé……………………………………...………….……………………3 Acknowledgements………………………………….……………………...4 Introduction…………………………………………………………………5 Chapter One Sources and Approaches………………………………….………………...9 Chapter Two Illyria and the Illyrians ……………………………………………………25 Chapter Three North-Western Greece in the Later Third Century………………………..41 Chapter Four Rome and the Outbreak of War…………………………………..……….51 Chapter Five The Conclusion of the First Illyrian War……………….…………………77 Conclusion …………………………………………………...…….……102 Bibliography……………………………………………………………..104 2 Abstract This paper presents a detailed case study in early Roman imperialism in the Greek East: the First Illyrian War (229/8 B.C.), Rome’s first military engagement across the Adriatic. It places Roman decision-making and action within its proper context by emphasizing the role that Greek polities and Illyrian tribes played in both the outbreak and conclusion of the war. It argues that the primary motivation behind the Roman decision to declare war against the Ardiaei in 229 was to secure the very profitable trade routes linking Brundisium to the eastern shore of the Adriatic. It was in fact the failure of the major Greek powers to limit Ardiaean piracy that led directly to Roman intervention. In the earliest phase of trans-Adriatic engagement Rome was essentially uninterested in expansion or establishing a formal hegemony in the Greek East and maintained only very loose ties to the polities of the eastern Adriatic coast.
    [Show full text]
  • The Making and Unmaking of Syria Strategy Under Trump
    REPORT SYRIA The Making and Unmaking of Syria Strategy under Trump NOVEMBER 29, 2018 — ARON LUND PAGE 1 The most effective way to change the world these days seems to be to plant a message directly in the brain of its most powerful inhabitant: Donald J. Trump, president of the United States of America. Although the U.S. executive branch always had a fairly free hand in foreign policy, ideas would normally need to snake their way through a whole series of interagency deliberations before landing on the Oval Office desk for a final verdict. But as media leaks and disgruntled former members of the Trump administration have made abundantly clear, decision- making in the current White House is both more temperamental and more personalized, revolving around a president known for forming strong opinions based on ideas picked up from television, friends, and other outside sources. Advocates inside and outside the U.S. government increasingly seem to operate under the assumption that the best way to influence American policy is to sidestep the bureaucracy and speak directly to an audience of one: Donald Trump. And, last September, that’s exactly what two pro-opposition Syrian-Americans managed to do after paying a Republican lobbyist to get seats at an Indiana fundraising dinner.1 President Trump later told the story: I was at a meeting with a lot of supporters, and a woman stood up and she said, “There’s a province in Syria with 3 million people. Right now, the Iranians, the Russians, and the Syrians are surrounding their province.
    [Show full text]
  • PERSPECTIVES on TERRORISM Volume 11, Issue 5
    ISSN 2334-3745 Volume V, Issue 5 October 2017 PERSPECTIVES ON TERRORISM Volume 11, Issue 5 Table of Contents Welcome from the Editors......................................................................................................1 Articles Countering Violent Extremism in Prisons: A Review of Key Recent Research and Critical Research Gaps.........................................................................................................................2 by Andrew Silke and Tinka Veldhuis The New Crusaders: Contemporary Extreme Right Symbolism and Rhetoric..................12 by Ariel Koch Exploring the Continuum of Lethality: Militant Islamists’ Targeting Preferences in Europe....................................................................................................................................24 by Cato Hemmingby Research Notes On and Off the Radar: Tactical and Strategic Responses to Screening Known Potential Terrorist Attackers................................................................................................................41 by Thomas Quiggin Resources Terrorism Bookshelf.............................................................................................................50 Capsule Reviews by Joshua Sinai Bibliography: Terrorist Organizations: Cells, Networks, Affiliations, Splits......................67 Compiled and selected by Judith Tinnes Bibliography: Life Cycles of Terrorism..............................................................................107 Compiled and selected by Judith
    [Show full text]
  • The Pulitzer Prizes 2020 Winne
    WINNERS AND FINALISTS 1917 TO PRESENT TABLE OF CONTENTS Excerpts from the Plan of Award ..............................................................2 PULITZER PRIZES IN JOURNALISM Public Service ...........................................................................................6 Reporting ...............................................................................................24 Local Reporting .....................................................................................27 Local Reporting, Edition Time ..............................................................32 Local General or Spot News Reporting ..................................................33 General News Reporting ........................................................................36 Spot News Reporting ............................................................................38 Breaking News Reporting .....................................................................39 Local Reporting, No Edition Time .......................................................45 Local Investigative or Specialized Reporting .........................................47 Investigative Reporting ..........................................................................50 Explanatory Journalism .........................................................................61 Explanatory Reporting ...........................................................................64 Specialized Reporting .............................................................................70
    [Show full text]
  • Albanian Catholic Bulletin Buletini Katholik Shqiptar
    ISSN 0272 -7250 ALBANIAN CATHOLIC BULLETIN PUBLISHED PERIODICALLY BY THE ALBANIAN CATHOLIC INFORMATION CENTER Vol.3, No. 1&2 P.O. BOX 1217, SANTA CLARA, CA 95053, U.S.A. 1982 BULETINI d^M. jpu. &CU& #*- <gP KATHOLIK Mother Teresa's message to all Albanians SHQIPTAR San Francisco, June 4, 1982 ALBANIAN CATHOLIC PUBLISHING COUNCIL: ZEF V. NEKAJ, JAK GARDIN, S.J., PJETER PAL VANI, NDOC KELMENDI, S.J., BAR­ BULLETIN BARA KAY (Assoc. Editor), PALOK PLAKU, RAYMOND FROST (Assoc. Editor), GJON SINISHTA (Editor), JULIO FERNANDEZ Volume III No.l&2 1982 (Secretary), and LEO GABRIEL NEAL, O.F.M., CONV. (President). In the past our Bulletin (and other material of information, in­ cluding the book "The Fulfilled Promise" about religious perse­ This issue has been prepared with the help of: STELLA PILGRIM, TENNANT C. cution in Albania) has been sent free to a considerable number WRIGHT, S.J., DAVE PREVITALE, JAMES of people, institutions and organizations in the U.S. and abroad. TORRENS, S.J., Sr. HENRY JOSEPH and Not affiliated with any Church or other religious or political or­ DANIEL GERMANN, S.J. ganization, we depend entirely on your donations and gifts. Please help us to continue this apostolate on behalf of the op­ pressed Albanians. STRANGERS ARE FRIENDS News, articles and photos of general interest, 100-1200 words WE HAVEN'T MET of length, on religious, cultural, historical and political topics about Albania and its people, may be submitted for considera­ tion. No payments are made for the published material. God knows Please enclose self-addressed envelope for return.
    [Show full text]
  • The Rise of Jihadist Propaganda on Social Networks Adam
    Rise of Jihadist Propaganda 1 The Rise of Jihadist Propaganda on Social Networks Adam Badawy, Emilio Ferrara* University of Southern California, Information Sciences Institute *Corresponding author: [email protected] Using a dataset of over 1.9 million messages posted on Twitter by about 25,000 ISIS members, we explore how ISIS makes use of social media to spread its propaganda and to recruit militants from the Arab world and across the globe. By distinguishing between violence-driven, theological, and sectarian content, we trace the connection between online rhetoric and key events on the ground. To the best of our knowledge, ours is one of the first studies to focus on Arabic content, while most literature focuses on English content. Our findings yield new important insights about how social media is used by radical militant groups to target the Arab-speaking world, and reveal important patterns in their propaganda efforts. Keywords: Computational Social Science, Social Media, Twitter, ISIS, Islamic Radicalization. Rise of Jihadist Propaganda 2 The Rise of Jihadist Propaganda on Social Networks Introduction Militant groups have long used traditional media and the Internet to disseminate information, spread their propaganda, and recruit potential militants (Cohen-Almagor, R. 2012). But no group to date has been as savvy in terms of its propaganda campaign and recruiting terrorists via the Internet, and specifically via social media platforms, as the Islamic State of Iraq and the Levant (ISIS) (Shane & Hubbard, 2014). ISIS used a panoply of platforms, such as: Facebook, Instagram, Tumbler, Ask.fm, and most prominently, Twitter to spread its message (Bodine-Baron et al 2016).
    [Show full text]
  • This Version Has the Raw Data in an Appendix)
    Accepted for publication in 2020 by the International Journal of Communication, ijoc.org (this version has the raw data in an appendix) Podcasting as Public Media: The Future of U.S. News, Public Affairs and Educational Podcasts PATRICIA AUFDERHEIDE American University, USA DAVID LIEBERMAN The New School, USA ATIKA ALKHALLOUF American University, USA JIJI MAJIRI UGBOMA The New School, USA This article identifies a U.S.-based podcasting ecology as public media, and then examines the threats to its future. It first identifies characteristics of a set of podcasts in the U.S. that allow them to be usefully described as public podcasting. Second, it looks at current business trends in podcasting as platformization proceeds. Third, it identifies threats to public podcasting’s current business practices. Finally, it analyzes responses within public podcasting to the potential threats. It concludes that currently, the public podcast ecology in the U.S. maintains some immunity from the most immediate threats, but that as well there are underappreciated threats to it both internally and externally. Keywords: podcasting, public media, platformization, business trends, public podcasting ecology As U.S. podcasting becomes an increasingly commercially-viable part of the media landscape, are its public-service functions at risk? This article explores that question, in the process postulating that the concept of public podcasting has utility in describing, not only a range of podcasting practices, but an ecology within the larger podcasting ecology—one that permits analysis of both business methods and social practices, one that deserves attention and even protection. This analysis contributes to the burgeoning literature on podcasting by enabling focused research in this area, permitting analysis of the sector in ways that permit thinking about the relationship of mission and business practice sector-wide.
    [Show full text]